Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-642-25243-3_6guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Lightweight RFID Mutual Authentication Protocol against Feasible Problems

Published: 23 November 2011 Publication History

Abstract

The wide deployment of RFID systems has raised many concerns about the security and privacy. Many RFID authentication protocols are proposed for these low-cost RFID tags. However, most of existing RFID authentication protocols suffer from some feasible problems. In this paper, we first discuss the feasible problems that exist in some RFID authentication protocols. Then we propose a lightweight RFID mutual authentication protocol against these feasible problems. To the best of our knowledge, it is the first scalable RFID authentication protocol that based on the SQUASH scheme. The new protocol is lightweight and can provide the forward security. In every authentication session, the tag produces the random number and the response is fresh. It also prevents the asynchronization between the reader and the tag. Additionally, the new protocol is secure against such attacks as replay attack, denial of service attack, man-in-the-middle attack and so on. We also show that it requires less cost of computation and storage than other similar protocols.

References

[1]
Juels A. RFID security and privacy: A research survey IEEE Journal on Selected Areas in Communications 2006 24 2 381-394
[2]
Peris-Lopez P., Hernandez-Castro J.C., Estevez-Tapiador J.M., and Ribagorda A. Ma J., Jin H., Yang L.T., and Tsai J.J.-P. M2AP: A Minimalist Mutual-authentication Protocol for Low-cost RFID Tags Ubiquitous Intelligence and Computing 2006 Heidelberg Springer 912-923
[3]
Lehtonen, M., Staake, T., Michahelles, F.: From identification to authentication-a review of RFID product authentication techniques. In: Networked RFID Systems and Lightweight Cryptography, pp. 169–187 (2008)
[4]
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems. Wiley Online Library (2010)
[5]
Ohkubo M., Suzuki K., and Kinoshita S. Cryptographic approach to ”privacy-friendly” tags RFID Privacy Workshop 2003 MA MIT
[6]
Molnar D. and Wagner D. Pfitzmann B. and Liu P. Privacy and security in library RFID: Issues, practices, and architectures Conference on Computer and Communications Security – ACM CCS 2004 Washington, DC ACM Press 210-219
[7]
Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 59–66 (2005)
[8]
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of 2nd Workshop on RFID Security (2006)
[9]
Li, T., Wang, G.: Security analysis of two ultra-lightweight RFID authentication protocols. In: New Approaches for Security, Privacy and Trust in Complex Environments, pp. 109–120 (2007)
[10]
Chien H.-Y. and Chen C.-H. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards Computer Standards & Interfaces 2007 29 2 254-259
[11]
Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An efficient forward private RFID protocol. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 43–53. ACM Press (2009)
[12]
Ma C., Li Y., Deng R.H., and Li T. RFID privacy: relation between two notions, minimal condition, and efficient construction Proceedings of the 16th ACM Conference on Computer and Communications Security 2009 New York ACM Press
[13]
Juels A. Blundo C. and Cimato S. Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract) Security in Communication Networks 2005 Heidelberg Springer 149-164
[14]
Shamir A. Nyberg K. SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices such as RFID Tags Fast Software Encryption 2008 Heidelberg Springer 144-157
[15]
Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. In: Symposium on Cryptography and Information Security, Hiroshima, Japan (2006)
[16]
Langheinrich M. A survey of RFID privacy approaches Personal and Ubiquitous Computing 2009 13 6 413-421
[17]
Koshy P., Valentin J., and Zhang X. Implementation and performance testing of the SQUASH RFID authentication protocol Applications and Technology Conference (LISAT), 2010 Long Island Systems 2010 New York IEEE Press
[18]
Gosset, F., Standaert, F.X., Quisquater, J.J.: FPGA implementation of SQUASH. In: Proceedings of the 29th Symposium on Information Theory in the Benelux (2008)

Index Terms

  1. Lightweight RFID Mutual Authentication Protocol against Feasible Problems
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Please enable JavaScript to view thecomments powered by Disqus.

              Information & Contributors

              Information

              Published In

              cover image Guide Proceedings
              Information and Communications Security: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
              Nov 2011
              443 pages
              ISBN:978-3-642-25242-6
              DOI:10.1007/978-3-642-25243-3
              • Editors:
              • Sihan Qing,
              • Willy Susilo,
              • Guilin Wang,
              • Dongmei Liu

              Publisher

              Springer-Verlag

              Berlin, Heidelberg

              Publication History

              Published: 23 November 2011

              Author Tags

              1. Security
              2. RFID
              3. Protocol
              4. Authentication
              5. SQUASH

              Qualifiers

              • Article

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • 0
                Total Citations
              • 0
                Total Downloads
              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 29 Nov 2024

              Other Metrics

              Citations

              View Options

              View options

              Login options

              Media

              Figures

              Other

              Tables

              Share

              Share

              Share this Publication link

              Share on social media